Knowledge Management With Respect To Challenges Faced By The It Departments In Supporting Social Network Sites And Smart Devices

  • 57948 Words
  • 257 Pages
  • Report
Read Complete Research Material



Knowledge Management with Respect to Challenges Faced by the IT Departments in Supporting Social Network Sites and Smart Devices

ACKNOWLEDGEMENT

I would like to take this chance for thanking my research facilitator, friends & family for the support that they provided & their belief in me as well as guidance that they provided without which I would have never been able to do this research.



DECLARATION

I, (Your name), would like to declare that all contents included in this thesis/dissertation stand for my individual work without any aid, & this thesis/dissertation has not been submitted for any examination at academic as well as professional level previously. It is also representing my very own views & not essentially that are associated with university.

Signed __________________ Date _________________

TABLE OF CONTENTS

DECLARATIONIII

CHAPTER 1: INTRODUCTION1

Introduction to the Problem1

Background to the Study2

Statement of the Problem3

Purpose of the Study4

Rationale4

Research Questions5

Significance of the Study6

Definition of Terms7

Knowledge Management8

Information Security8

Social Network9

Social Networking Website10

Facebook10

LinkedIn11

Twitter11

WebEx12

Mobile Devices13

Personal Digital Assistant (PDA)14

Information Technology (IT)15

Assumptions of the Study15

Limitations of the Study15

Nature of the Study (or Theoretical/Conceptual Framework)17

Organization of the Remainder of the Study18

CHAPTER 2: LITERATURE REVIEW20

Social networks and their impact on businesses21

What is Social Networking?23

Show Ads33

Involving the interests of clients34

Dissemination of advertising34

Includes links to sites of e-commerce web34

Labeling of social media sites34

An integrated social media strategy37

The online hub and spoke model38

The power structure of social marketing39

Blogging39

RSS40

Social Search40

Social Bookmarking40

Social Networks40

Micro41

Some other direction to look at the pyramid42

Social networking and Data Security44

The various security problems faced by social networks and Mobile devices45

Secure profile on social networks46

Personal websites and databases48

Twitter allows direct access messages from its users without permission48

Security: social networking business concern50

Facebook: No. 1 threat50

Twitter: Vulnerable to Cyber attacks50

Security and rules of social networks51

Facebook has great privacy and security failures53

Learn more dangerous web applications54

Facebook face possible attack enhances the security of its web version55

The new risks with social networking56

Social network security: new challenges to IT departments58

Security threat vulnerabilities and their Exploitation67

Knowledge Management75

Knowledge management and information technology75

Social Roots of KM78

Economic roots of KM79

Technological roots of KM81

Technology for KM83

Mobile security: how vulnerable our Smartphones?83

Botnets84

Malicious applications85

Spyware86

Bluetooth87

Wi-Fi88

Phishing88

Traditional security89

Other security measures89

Trojan Horses, Malware, and Viruses91

Third-Party Apps That Share Too Much92

Which OS Is the Most Secure?93

Smartphone Security for the IT Crowd94

Secure instant messaging99

Smartphone security follies: A brief history100

RIM patches PDF vulnerability101

Skype springs leaks102

Secure instant messaging103

Smartphone security follies: A brief history104

RIM patches PDF vulnerability105

Skype springs leaks107

Why Smartphone Security Has to Come Front and Centre107

Smartphone security: Is mobile malware threat looming this year?110

Smartphone security: Is mobile malware threat looming this year?112

Cry wolf115

Human risk116

Low awareness117

Flaws118

What solutions?119

Theft of confidential data transmitted over the network122

Companies are wary of social networks127

The attitude of employers128

Knowledge129

Taxonomies of Knowledge130

Knowledge Management131

Knowledge Management Strategy133

Knowledge Management Enablers135

Technology135

Structure136

Organizational Culture137

Knowledge Management Process Capability138

Internal and External Knowledge Acquisition139

Knowledge Upgrade Capability140

Knowledge Protection Capability140

Knowledge Conversion Capability141

Knowledge Application Capability141

Companies that seem helpless in the face of the risks associated with new technology142

Impacts related to security incidents increased sharply143

Budget: between and increase stress while increasing the risks and incidents143

CHAPTER 3: METHODOLOGY148

Introduction148

Research Design150

The process of building grounded theory153

The generation of theory and inductive approach155

Theoretical sampling and data saturation155

The constant comparative method156

The memos157

The theoretical sensitivity158

Philosophical Framework or Paradigm159

Social Constructivist Theory162

Phenomenology164

Rationale ...